From dde4f0fed70abc08c0491a0cfb0921987a4e1fdc Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Tue, 28 Jul 2020 14:02:22 +0100 Subject: [PATCH] Deployed 96634bf with MkDocs version: 1.0.4 --- expansion/index.html | 36 ++++++++++++++++++++++++++++++++++-- search/search_index.json | 2 +- sitemap.xml.gz | Bin 251 -> 251 bytes 3 files changed, 35 insertions(+), 3 deletions(-) diff --git a/expansion/index.html b/expansion/index.html index 5743b29..346b02b 100644 --- a/expansion/index.html +++ b/expansion/index.html @@ -617,6 +617,13 @@ rbl + + +
Module to access GreyNoise.io API - features:
-The module takes an IP address as input and queries Greynoise for some additional information about it. The result is returned as text. +
The module takes an IP address as input and queries Greynoise for some additional information about it: basically it checks whether a given IP address is “Internet background noise”, or has been observed scanning or attacking devices across the Internet. The result is returned as text. - input: An IP address. - output: Additional information about the IP fetched from Greynoise API. - references: -https://greynoise.io/, https://github.com/GreyNoise-Intelligence/api.greynoise.io
+https://greynoise.io/, https://github.com/GreyNoise-Intelligence/api.greynoise.io +- requirements: +A Greynoise API key.
Module to enrich attributes with threat intelligence from Recorded Future. +- features:
+++Enrich an attribute to add a custom enrichment object to the event. The object contains a copy of the enriched attribute with added tags presenting risk score and triggered risk rules from Recorded Future. Malware and Threat Actors related to the enriched indicator in Recorded Future is matched against MISP's galaxy clusters and applied as galaxy tags. The custom enrichment object also includes a list of related indicators from Recorded Future (IP's, domains, hashes, URL's and vulnerabilities) added as additional attributes. +- input: +A MISP attribute of one of the following types: ip, ip-src, ip-dst, domain, hostname, md5, sha1, sha256, uri, url, vulnerability, weakness. +- output: +A MISP object containing a copy of the enriched attribute with added tags from Recorded Future and a list of new attributes related to the enriched attribute. +- references: +https://www.recordedfuture.com/ +- requirements: +A Recorded Future API token.
+
Simple Reverse DNS expansion service to resolve reverse DNS from MISP attributes. - features:
diff --git a/search/search_index.json b/search/search_index.json index 80cde7c..bceb15c 100644 --- a/search/search_index.json +++ b/search/search_index.json @@ -1 +1 @@ -{"config":{"lang":["en"],"prebuild_index":false,"separator":"[\\s\\-]+"},"docs":[{"location":"","text":"Home \u00b6 MISP modules are autonomous modules that can be used for expansion and other services in MISP . The modules are written in Python 3 following a simple API interface. The objective is to ease the extensions of MISP functionalities without modifying core components. The API is available via a simple REST API which is independent from MISP installation or configuration. MISP modules support is included in MISP starting from version 2.4.28 . For more information: Extending MISP with Python modules slides from MISP training. Existing MISP modules \u00b6 Expansion modules \u00b6 Backscatter.io - a hover and expansion module to expand an IP address with mass-scanning observations. BGP Ranking - a hover and expansion module to expand an AS number with the ASN description, its history, and position in BGP Ranking. BTC scam check - An expansion hover module to instantly check if a BTC address has been abused. BTC transactions - An expansion hover module to get a blockchain balance and the transactions from a BTC address in MISP. CIRCL Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. CIRCL Passive SSL - a hover and expansion module to expand IP addresses with the X.509 certificate seen. countrycode - a hover module to tell you what country a URL belongs to. CrowdStrike Falcon - an expansion module to expand using CrowdStrike Falcon Intel Indicator API. CVE - a hover module to give more information about a vulnerability (CVE). CVE advanced - An expansion module to query the CIRCL CVE search API for more information about a vulnerability (CVE). Cuckoo submit - A hover module to submit malware sample, url, attachment, domain to Cuckoo Sandbox. DBL Spamhaus - a hover module to check Spamhaus DBL for a domain name. DNS - a simple module to resolve MISP attributes like hostname and domain to expand IP addresses attributes. docx-enrich - an enrichment module to get text out of Word document into MISP (using free-text parser). DomainTools - a hover and expansion module to get information from DomainTools whois. EUPI - a hover and expansion module to get information about an URL from the Phishing Initiative project . EQL - an expansion module to generate event query language (EQL) from an attribute. Event Query Language Farsight DNSDB Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. GeoIP - a hover and expansion module to get GeoIP information from geolite/maxmind. Greynoise - a hover to get information from greynoise. hashdd - a hover module to check file hashes against hashdd.com including NSLR dataset. hibp - a hover module to lookup against Have I Been Pwned? intel471 - an expansion module to get info from Intel471 . IPASN - a hover and expansion to get the BGP ASN of an IP address. iprep - an expansion module to get IP reputation from packetmail.net. Joe Sandbox submit - Submit files and URLs to Joe Sandbox. Joe Sandbox query - Query Joe Sandbox with the link of an analysis and get the parsed data. macaddress.io - a hover module to retrieve vendor details and other information regarding a given MAC address or an OUI from MAC address Vendor Lookup . See integration tutorial here . macvendors - a hover module to retrieve mac vendor information. ocr-enrich - an enrichment module to get OCRized data from images into MISP. ods-enrich - an enrichment module to get text out of OpenOffice spreadsheet document into MISP (using free-text parser). odt-enrich - an enrichment module to get text out of OpenOffice document into MISP (using free-text parser). onyphe - a modules to process queries on Onyphe. onyphe_full - a modules to process full queries on Onyphe. OTX - an expansion module for OTX . passivetotal - a passivetotal module that queries a number of different PassiveTotal datasets. pdf-enrich - an enrichment module to extract text from PDF into MISP (using free-text parser). pptx-enrich - an enrichment module to get text out of PowerPoint document into MISP (using free-text parser). qrcode - a module decode QR code, barcode and similar codes from an image and enrich with the decoded values. rbl - a module to get RBL (Real-Time Blackhost List) values from an attribute. reversedns - Simple Reverse DNS expansion service to resolve reverse DNS from MISP attributes. securitytrails - an expansion module for securitytrails . shodan - a minimal shodan expansion module. Sigma queries - Experimental expansion module querying a sigma rule to convert it into all the available SIEM signatures. Sigma syntax validator - Sigma syntax validator. sourcecache - a module to cache a specific link from a MISP instance. STIX2 pattern syntax validator - a module to check a STIX2 pattern syntax. ThreatCrowd - an expansion module for ThreatCrowd . threatminer - an expansion module to expand from ThreatMiner . urlhaus - Query urlhaus to get additional data about a domain, hash, hostname, ip or url. urlscan - an expansion module to query urlscan.io . virustotal - an expansion module to query the VirusTotal API with a high request rate limit required. (More details about the API: here ) virustotal_public - an expansion module to query the VirusTotal API with a public key and a low request rate limit. (More details about the API: here ) VMray - a module to submit a sample to VMray. VulnDB - a module to query VulnDB . Vulners - an expansion module to expand information about CVEs using Vulners API. whois - a module to query a local instance of uwhois . wikidata - a wikidata expansion module. xforce - an IBM X-Force Exchange expansion module. xlsx-enrich - an enrichment module to get text out of an Excel document into MISP (using free-text parser). YARA query - a module to create YARA rules from single hash attributes. YARA syntax validator - YARA syntax validator. Export modules \u00b6 CEF module to export Common Event Format (CEF). Cisco FireSight Manager ACL rule module to export as rule for the Cisco FireSight manager ACL. GoAML export module to export in GoAML format . Lite Export module to export a lite event. Mass EQL Export module to export applicable attributes from an event to a mass EQL query. PDF export module to export an event in PDF. Nexthink query format module to export in Nexthink query format. osquery module to export in osquery query format. ThreatConnect module to export in ThreatConnect CSV format. ThreatStream module to export in ThreatStream format. Import modules \u00b6 CSV import Customizable CSV import module. Cuckoo JSON Cuckoo JSON import. Email Import Email import module for MISP to import basic metadata. GoAML import Module to import GoAML XML format. Joe Sandbox import Parse data from a Joe Sandbox json report. OCR Optical Character Recognition (OCR) module for MISP to import attributes from images, scan or faxes. OpenIOC OpenIOC import based on PyMISP library. ThreatAnalyzer - An import module to process ThreatAnalyzer archive.zip/analysis.json sandbox exports. VMRay - An import module to process VMRay export. How to contribute your own module? \u00b6 Fork the project, add your module, test it and make a pull-request. Modules can be also private as you can add a module in your own MISP installation. For further information please see Contribute . Licenses \u00b6 For further Information see also the license file .","title":"Home"},{"location":"#home","text":"MISP modules are autonomous modules that can be used for expansion and other services in MISP . The modules are written in Python 3 following a simple API interface. The objective is to ease the extensions of MISP functionalities without modifying core components. The API is available via a simple REST API which is independent from MISP installation or configuration. MISP modules support is included in MISP starting from version 2.4.28 . For more information: Extending MISP with Python modules slides from MISP training.","title":"Home"},{"location":"#existing-misp-modules","text":"","title":"Existing MISP modules"},{"location":"#expansion-modules","text":"Backscatter.io - a hover and expansion module to expand an IP address with mass-scanning observations. BGP Ranking - a hover and expansion module to expand an AS number with the ASN description, its history, and position in BGP Ranking. BTC scam check - An expansion hover module to instantly check if a BTC address has been abused. BTC transactions - An expansion hover module to get a blockchain balance and the transactions from a BTC address in MISP. CIRCL Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. CIRCL Passive SSL - a hover and expansion module to expand IP addresses with the X.509 certificate seen. countrycode - a hover module to tell you what country a URL belongs to. CrowdStrike Falcon - an expansion module to expand using CrowdStrike Falcon Intel Indicator API. CVE - a hover module to give more information about a vulnerability (CVE). CVE advanced - An expansion module to query the CIRCL CVE search API for more information about a vulnerability (CVE). Cuckoo submit - A hover module to submit malware sample, url, attachment, domain to Cuckoo Sandbox. DBL Spamhaus - a hover module to check Spamhaus DBL for a domain name. DNS - a simple module to resolve MISP attributes like hostname and domain to expand IP addresses attributes. docx-enrich - an enrichment module to get text out of Word document into MISP (using free-text parser). DomainTools - a hover and expansion module to get information from DomainTools whois. EUPI - a hover and expansion module to get information about an URL from the Phishing Initiative project . EQL - an expansion module to generate event query language (EQL) from an attribute. Event Query Language Farsight DNSDB Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. GeoIP - a hover and expansion module to get GeoIP information from geolite/maxmind. Greynoise - a hover to get information from greynoise. hashdd - a hover module to check file hashes against hashdd.com including NSLR dataset. hibp - a hover module to lookup against Have I Been Pwned? intel471 - an expansion module to get info from Intel471 . IPASN - a hover and expansion to get the BGP ASN of an IP address. iprep - an expansion module to get IP reputation from packetmail.net. Joe Sandbox submit - Submit files and URLs to Joe Sandbox. Joe Sandbox query - Query Joe Sandbox with the link of an analysis and get the parsed data. macaddress.io - a hover module to retrieve vendor details and other information regarding a given MAC address or an OUI from MAC address Vendor Lookup . See integration tutorial here . macvendors - a hover module to retrieve mac vendor information. ocr-enrich - an enrichment module to get OCRized data from images into MISP. ods-enrich - an enrichment module to get text out of OpenOffice spreadsheet document into MISP (using free-text parser). odt-enrich - an enrichment module to get text out of OpenOffice document into MISP (using free-text parser). onyphe - a modules to process queries on Onyphe. onyphe_full - a modules to process full queries on Onyphe. OTX - an expansion module for OTX . passivetotal - a passivetotal module that queries a number of different PassiveTotal datasets. pdf-enrich - an enrichment module to extract text from PDF into MISP (using free-text parser). pptx-enrich - an enrichment module to get text out of PowerPoint document into MISP (using free-text parser). qrcode - a module decode QR code, barcode and similar codes from an image and enrich with the decoded values. rbl - a module to get RBL (Real-Time Blackhost List) values from an attribute. reversedns - Simple Reverse DNS expansion service to resolve reverse DNS from MISP attributes. securitytrails - an expansion module for securitytrails . shodan - a minimal shodan expansion module. Sigma queries - Experimental expansion module querying a sigma rule to convert it into all the available SIEM signatures. Sigma syntax validator - Sigma syntax validator. sourcecache - a module to cache a specific link from a MISP instance. STIX2 pattern syntax validator - a module to check a STIX2 pattern syntax. ThreatCrowd - an expansion module for ThreatCrowd . threatminer - an expansion module to expand from ThreatMiner . urlhaus - Query urlhaus to get additional data about a domain, hash, hostname, ip or url. urlscan - an expansion module to query urlscan.io . virustotal - an expansion module to query the VirusTotal API with a high request rate limit required. (More details about the API: here ) virustotal_public - an expansion module to query the VirusTotal API with a public key and a low request rate limit. (More details about the API: here ) VMray - a module to submit a sample to VMray. VulnDB - a module to query VulnDB . Vulners - an expansion module to expand information about CVEs using Vulners API. whois - a module to query a local instance of uwhois . wikidata - a wikidata expansion module. xforce - an IBM X-Force Exchange expansion module. xlsx-enrich - an enrichment module to get text out of an Excel document into MISP (using free-text parser). YARA query - a module to create YARA rules from single hash attributes. YARA syntax validator - YARA syntax validator.","title":"Expansion modules"},{"location":"#export-modules","text":"CEF module to export Common Event Format (CEF). Cisco FireSight Manager ACL rule module to export as rule for the Cisco FireSight manager ACL. GoAML export module to export in GoAML format . Lite Export module to export a lite event. Mass EQL Export module to export applicable attributes from an event to a mass EQL query. PDF export module to export an event in PDF. Nexthink query format module to export in Nexthink query format. osquery module to export in osquery query format. ThreatConnect module to export in ThreatConnect CSV format. ThreatStream module to export in ThreatStream format.","title":"Export modules"},{"location":"#import-modules","text":"CSV import Customizable CSV import module. Cuckoo JSON Cuckoo JSON import. Email Import Email import module for MISP to import basic metadata. GoAML import Module to import GoAML XML format. Joe Sandbox import Parse data from a Joe Sandbox json report. OCR Optical Character Recognition (OCR) module for MISP to import attributes from images, scan or faxes. OpenIOC OpenIOC import based on PyMISP library. ThreatAnalyzer - An import module to process ThreatAnalyzer archive.zip/analysis.json sandbox exports. VMRay - An import module to process VMRay export.","title":"Import modules"},{"location":"#how-to-contribute-your-own-module","text":"Fork the project, add your module, test it and make a pull-request. Modules can be also private as you can add a module in your own MISP installation. For further information please see Contribute .","title":"How to contribute your own module?"},{"location":"#licenses","text":"For further Information see also the license file .","title":"Licenses"},{"location":"contribute/","text":"How to add your own MISP modules? \u00b6 Create your module in misp_modules/modules/expansion/ , misp_modules/modules/export_mod/ , or misp_modules/modules/import_mod/ . The module should have at minimum three functions: introspection function that returns a dict of the supported attributes (input and output) by your expansion module. handler function which accepts a JSON document to expand the values and return a dictionary of the expanded values. version function that returns a dict with the version and the associated meta-data including potential configurations required of the module. Don't forget to return an error key and value if an error is raised to propagate it to the MISP user-interface. Your module's script name should also be added in the __all__ list of